Stagefright vulnerability was first discovered in April, the vulnerability allowed attackers to target Android phones over text or MMS, exploiting a weakness in Android’s multimedia preview function. And after three months its happening again, this time the bugs has new name – Stagefright 2.0.

The vulnerability lies in the processing of metadata within the files, so merely previewing the song or video would trigger the issue. One of the exploits –assigned a Common Vulnerabilites and Exposures (CVE) number of CVE-2015-6602 – reportedly affects Android devices from 1.0 above, the second, unnumbered vulnerability affects devices running 5.0 and above.This second vulnerability may also affect third-party applications due to the issue being found within the libstagefright library used by some media players.

Also See : [p2p type=”slug” value=”virus-in-candy-crush-and-other-popular-games-attacking-android-users” attributes=”target=’_blank'”]Virus In Candy Crush And Other Popular Games Attacking Android Users[/p2p]

According to Motherboard, Zuk Avraham, Zimperium zLabs’ founder and Chief Technology Officer, said that 1.4 billion people are likely affected by the vulnerabilities, explaining, “I cannot tell you that all of the phones are vulnerable, but most of them are.”

Google’s latest Android operating system, Marshmallow, will reportedly carry the fix for the issue, though older devices that cannot be updated to Android Marshmallow may end up being stuck with vulnerabilities inside them.

Also See : [p2p type=”slug” value=”ransomware-porn-app-attacking-android-users” attributes=”target=’_blank'”]Ransomware In The Form Of A Fake Porn App Attacking Android Users[/p2p]

Founder and Editor-in-chief of TechLog360, who mainly publishes posts related to new technologies, gadgets and open-source world. His main hobbies are web designing, blogging, search engine optimization and making friends.